Overview
overview
10Static
static
10VirusPack/...sc.vbs
windows11-21h2-x64
1VirusPack/...X.html
windows11-21h2-x64
4VirusPack/...sc.vbs
windows11-21h2-x64
1VirusPack/...st.exe
windows11-21h2-x64
3VirusPack/...sc.vbs
windows11-21h2-x64
1VirusPack/...t1.exe
windows11-21h2-x64
3VirusPack/...tub.js
windows11-21h2-x64
3VirusPack/...ub.exe
windows11-21h2-x64
7VirusPack/...og.vbs
windows11-21h2-x64
1VirusPack/...e2.vbs
windows11-21h2-x64
1VirusPack/...pt.vbs
windows11-21h2-x64
1VirusPack/...in.vbs
windows11-21h2-x64
1VirusPack/...ys.vbs
windows11-21h2-x64
1VirusPack/...e1.vbs
windows11-21h2-x64
1VirusPack/...ns.vbs
windows11-21h2-x64
1VirusPack/...on.vbs
windows11-21h2-x64
1VirusPack/...ne.vbs
windows11-21h2-x64
1VirusPack/...er.vbs
windows11-21h2-x64
1VirusPack/...C4.vbs
windows11-21h2-x64
1VirusPack/...PE.vbs
windows11-21h2-x64
1VirusPack/...l1.vbs
windows11-21h2-x64
1VirusPack/...sh.vbs
windows11-21h2-x64
1VirusPack/...e1.vbs
windows11-21h2-x64
1VirusPack/...sh.vbs
windows11-21h2-x64
1VirusPack/...C4.vbs
windows11-21h2-x64
1VirusPack/...ys.vbs
windows11-21h2-x64
1VirusPack/...Pe.vbs
windows11-21h2-x64
1VirusPack/...bf.vbs
windows11-21h2-x64
1VirusPack/...t.html
windows11-21h2-x64
4VirusPack/...me.exe
windows11-21h2-x64
3VirusPack/...n.html
windows11-21h2-x64
4VirusPack/...r.html
windows11-21h2-x64
4Analysis
-
max time kernel
899s -
max time network
876s -
platform
windows11-21h2_x64 -
resource
win11-20241023-fr -
resource tags
arch:x64arch:x86image:win11-20241023-frlocale:fr-fros:windows11-21h2-x64systemwindows -
submitted
18-01-2025 21:03
Behavioral task
behavioral1
Sample
VirusPack/Darkness.last.mod (2)/Darkness.last.mod/misc.vbs
Resource
win11-20241007-fr
Behavioral task
behavioral2
Sample
VirusPack/Darkness.last.mod/Darkness.last.mod/Agent_X.html
Resource
win11-20241007-fr
Behavioral task
behavioral3
Sample
VirusPack/Darkness.last.mod/Darkness.last.mod/misc.vbs
Resource
win11-20241007-fr
Behavioral task
behavioral4
Sample
VirusPack/Dbot.v3.1/MD5ChecksumTest.exe
Resource
win11-20241007-fr
Behavioral task
behavioral5
Sample
VirusPack/Dbot.v3.1/misc.vbs
Resource
win11-20241007-fr
Behavioral task
behavioral6
Sample
VirusPack/Dwighlight_Stealer/Builder/Project1.exe
Resource
win11-20241007-fr
Behavioral task
behavioral7
Sample
VirusPack/Dwighlight_Stealer/Stub/Stub.js
Resource
win11-20241007-fr
Behavioral task
behavioral8
Sample
VirusPack/Dwighlight_Stealer/Stub/Stub.exe
Resource
win11-20241007-fr
Behavioral task
behavioral9
Sample
VirusPack/DynastryCrypterSource/DynastryCrypterSource/Darow's Crypter 2.0/Client/Classes/cFileDialog.vbs
Resource
win11-20241007-fr
Behavioral task
behavioral10
Sample
VirusPack/DynastryCrypterSource/DynastryCrypterSource/Darow's Crypter 2.0/Client/Forms/Module2.vbs
Resource
win11-20241007-fr
Behavioral task
behavioral11
Sample
VirusPack/DynastryCrypterSource/DynastryCrypterSource/Darow's Crypter 2.0/Client/Forms/fDynastyCrypt.vbs
Resource
win11-20241007-fr
Behavioral task
behavioral12
Sample
VirusPack/DynastryCrypterSource/DynastryCrypterSource/Darow's Crypter 2.0/Client/Forms/frmLogin.vbs
Resource
win11-20241007-fr
Behavioral task
behavioral13
Sample
VirusPack/DynastryCrypterSource/DynastryCrypterSource/Darow's Crypter 2.0/Client/Forms/mLoginSys.vbs
Resource
win11-20241023-fr
Behavioral task
behavioral14
Sample
VirusPack/DynastryCrypterSource/DynastryCrypterSource/Darow's Crypter 2.0/Client/Module1.vbs
Resource
win11-20241007-fr
Behavioral task
behavioral15
Sample
VirusPack/DynastryCrypterSource/DynastryCrypterSource/Darow's Crypter 2.0/Client/Modules/clsTrans.vbs
Resource
win11-20241007-fr
Behavioral task
behavioral16
Sample
VirusPack/DynastryCrypterSource/DynastryCrypterSource/Darow's Crypter 2.0/Client/Modules/mAddSection.vbs
Resource
win11-20241007-fr
Behavioral task
behavioral17
Sample
VirusPack/DynastryCrypterSource/DynastryCrypterSource/Darow's Crypter 2.0/Client/Modules/mFullClone.vbs
Resource
win11-20241023-fr
Behavioral task
behavioral18
Sample
VirusPack/DynastryCrypterSource/DynastryCrypterSource/Darow's Crypter 2.0/Client/Modules/mIconChanger.vbs
Resource
win11-20241007-fr
Behavioral task
behavioral19
Sample
VirusPack/DynastryCrypterSource/DynastryCrypterSource/Darow's Crypter 2.0/Client/Modules/mRC4.vbs
Resource
win11-20241007-fr
Behavioral task
behavioral20
Sample
VirusPack/DynastryCrypterSource/DynastryCrypterSource/Darow's Crypter 2.0/Client/Modules/mRePE.vbs
Resource
win11-20241007-fr
Behavioral task
behavioral21
Sample
VirusPack/DynastryCrypterSource/DynastryCrypterSource/Darow's Crypter 2.0/Client/Trans/UserControl1.vbs
Resource
win11-20241007-fr
Behavioral task
behavioral22
Sample
VirusPack/DynastryCrypterSource/DynastryCrypterSource/Darow's Crypter 2.0/Client/clsBlowfish.vbs
Resource
win11-20241007-fr
Behavioral task
behavioral23
Sample
VirusPack/DynastryCrypterSource/DynastryCrypterSource/Darow's Crypter 2.0/Generator/Generated/Module1.vbs
Resource
win11-20241007-fr
Behavioral task
behavioral24
Sample
VirusPack/DynastryCrypterSource/DynastryCrypterSource/Darow's Crypter 2.0/Generator/Generated/clsBlowfish.vbs
Resource
win11-20241007-fr
Behavioral task
behavioral25
Sample
VirusPack/DynastryCrypterSource/DynastryCrypterSource/Darow's Crypter 2.0/Generator/mEncRC4.vbs
Resource
win11-20241007-fr
Behavioral task
behavioral26
Sample
VirusPack/DynastryCrypterSource/DynastryCrypterSource/Darow's Crypter 2.0/Generator/mLoginSys.vbs
Resource
win11-20241007-fr
Behavioral task
behavioral27
Sample
VirusPack/DynastryCrypterSource/DynastryCrypterSource/Darow's Crypter 2.0/Generator/mPe.vbs
Resource
win11-20241007-fr
Behavioral task
behavioral28
Sample
VirusPack/DynastryCrypterSource/DynastryCrypterSource/Darow's Crypter 2.0/Generator/mStringObf.vbs
Resource
win11-20241007-fr
Behavioral task
behavioral29
Sample
VirusPack/FBIRAT_Fuck_Hack_Hound/FBIClient/FBIClient.html
Resource
win11-20241007-fr
Behavioral task
behavioral30
Sample
VirusPack/FBIRAT_Fuck_Hack_Hound/FBIClient/Name.exe
Resource
win11-20241023-fr
Behavioral task
behavioral31
Sample
VirusPack/FBIRAT_Fuck_Hack_Hound/Injection/Injection.html
Resource
win11-20241023-fr
Behavioral task
behavioral32
Sample
VirusPack/FBIRAT_Fuck_Hack_Hound/Injection/Server/Server.html
Resource
win11-20241007-fr
General
-
Target
VirusPack/FBIRAT_Fuck_Hack_Hound/Injection/Injection.html
-
Size
1KB
-
MD5
89c4632dbc6ccfc077178f989b216fde
-
SHA1
2cb78515f9280fef096d856a86bb476b0f1aa46e
-
SHA256
439e53132f492a5db8d7cb0b844325a15b5b40e7f697421d77cabf0f240c6136
-
SHA512
47a4be42bad02b0d94b6b4efac35a3bf19e08ac80d2c943763de38462aea5eead7fe34ef81e5992c0b273a5064040c99d0d84abffec32399220c9718ae4aee2f
Malware Config
Signatures
-
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe File opened for modification C:\Windows\INF\display.PNF chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133817090758276246" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3392 chrome.exe 3392 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3392 chrome.exe 3392 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3392 chrome.exe Token: SeCreatePagefilePrivilege 3392 chrome.exe Token: SeShutdownPrivilege 3392 chrome.exe Token: SeCreatePagefilePrivilege 3392 chrome.exe Token: SeShutdownPrivilege 3392 chrome.exe Token: SeCreatePagefilePrivilege 3392 chrome.exe Token: SeShutdownPrivilege 3392 chrome.exe Token: SeCreatePagefilePrivilege 3392 chrome.exe Token: SeShutdownPrivilege 3392 chrome.exe Token: SeCreatePagefilePrivilege 3392 chrome.exe Token: SeShutdownPrivilege 3392 chrome.exe Token: SeCreatePagefilePrivilege 3392 chrome.exe Token: SeShutdownPrivilege 3392 chrome.exe Token: SeCreatePagefilePrivilege 3392 chrome.exe Token: SeShutdownPrivilege 3392 chrome.exe Token: SeCreatePagefilePrivilege 3392 chrome.exe Token: SeShutdownPrivilege 3392 chrome.exe Token: SeCreatePagefilePrivilege 3392 chrome.exe Token: SeShutdownPrivilege 3392 chrome.exe Token: SeCreatePagefilePrivilege 3392 chrome.exe Token: SeShutdownPrivilege 3392 chrome.exe Token: SeCreatePagefilePrivilege 3392 chrome.exe Token: SeShutdownPrivilege 3392 chrome.exe Token: SeCreatePagefilePrivilege 3392 chrome.exe Token: SeShutdownPrivilege 3392 chrome.exe Token: SeCreatePagefilePrivilege 3392 chrome.exe Token: SeShutdownPrivilege 3392 chrome.exe Token: SeCreatePagefilePrivilege 3392 chrome.exe Token: SeShutdownPrivilege 3392 chrome.exe Token: SeCreatePagefilePrivilege 3392 chrome.exe Token: SeShutdownPrivilege 3392 chrome.exe Token: SeCreatePagefilePrivilege 3392 chrome.exe Token: SeShutdownPrivilege 3392 chrome.exe Token: SeCreatePagefilePrivilege 3392 chrome.exe Token: SeShutdownPrivilege 3392 chrome.exe Token: SeCreatePagefilePrivilege 3392 chrome.exe Token: SeShutdownPrivilege 3392 chrome.exe Token: SeCreatePagefilePrivilege 3392 chrome.exe Token: SeShutdownPrivilege 3392 chrome.exe Token: SeCreatePagefilePrivilege 3392 chrome.exe Token: SeShutdownPrivilege 3392 chrome.exe Token: SeCreatePagefilePrivilege 3392 chrome.exe Token: SeShutdownPrivilege 3392 chrome.exe Token: SeCreatePagefilePrivilege 3392 chrome.exe Token: SeShutdownPrivilege 3392 chrome.exe Token: SeCreatePagefilePrivilege 3392 chrome.exe Token: SeShutdownPrivilege 3392 chrome.exe Token: SeCreatePagefilePrivilege 3392 chrome.exe Token: SeShutdownPrivilege 3392 chrome.exe Token: SeCreatePagefilePrivilege 3392 chrome.exe Token: SeShutdownPrivilege 3392 chrome.exe Token: SeCreatePagefilePrivilege 3392 chrome.exe Token: SeShutdownPrivilege 3392 chrome.exe Token: SeCreatePagefilePrivilege 3392 chrome.exe Token: SeShutdownPrivilege 3392 chrome.exe Token: SeCreatePagefilePrivilege 3392 chrome.exe Token: SeShutdownPrivilege 3392 chrome.exe Token: SeCreatePagefilePrivilege 3392 chrome.exe Token: SeShutdownPrivilege 3392 chrome.exe Token: SeCreatePagefilePrivilege 3392 chrome.exe Token: SeShutdownPrivilege 3392 chrome.exe Token: SeCreatePagefilePrivilege 3392 chrome.exe Token: SeShutdownPrivilege 3392 chrome.exe Token: SeCreatePagefilePrivilege 3392 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3392 wrote to memory of 3388 3392 chrome.exe 77 PID 3392 wrote to memory of 3388 3392 chrome.exe 77 PID 3392 wrote to memory of 3628 3392 chrome.exe 78 PID 3392 wrote to memory of 3628 3392 chrome.exe 78 PID 3392 wrote to memory of 3628 3392 chrome.exe 78 PID 3392 wrote to memory of 3628 3392 chrome.exe 78 PID 3392 wrote to memory of 3628 3392 chrome.exe 78 PID 3392 wrote to memory of 3628 3392 chrome.exe 78 PID 3392 wrote to memory of 3628 3392 chrome.exe 78 PID 3392 wrote to memory of 3628 3392 chrome.exe 78 PID 3392 wrote to memory of 3628 3392 chrome.exe 78 PID 3392 wrote to memory of 3628 3392 chrome.exe 78 PID 3392 wrote to memory of 3628 3392 chrome.exe 78 PID 3392 wrote to memory of 3628 3392 chrome.exe 78 PID 3392 wrote to memory of 3628 3392 chrome.exe 78 PID 3392 wrote to memory of 3628 3392 chrome.exe 78 PID 3392 wrote to memory of 3628 3392 chrome.exe 78 PID 3392 wrote to memory of 3628 3392 chrome.exe 78 PID 3392 wrote to memory of 3628 3392 chrome.exe 78 PID 3392 wrote to memory of 3628 3392 chrome.exe 78 PID 3392 wrote to memory of 3628 3392 chrome.exe 78 PID 3392 wrote to memory of 3628 3392 chrome.exe 78 PID 3392 wrote to memory of 3628 3392 chrome.exe 78 PID 3392 wrote to memory of 3628 3392 chrome.exe 78 PID 3392 wrote to memory of 3628 3392 chrome.exe 78 PID 3392 wrote to memory of 3628 3392 chrome.exe 78 PID 3392 wrote to memory of 3628 3392 chrome.exe 78 PID 3392 wrote to memory of 3628 3392 chrome.exe 78 PID 3392 wrote to memory of 3628 3392 chrome.exe 78 PID 3392 wrote to memory of 3628 3392 chrome.exe 78 PID 3392 wrote to memory of 3628 3392 chrome.exe 78 PID 3392 wrote to memory of 3628 3392 chrome.exe 78 PID 3392 wrote to memory of 2840 3392 chrome.exe 79 PID 3392 wrote to memory of 2840 3392 chrome.exe 79 PID 3392 wrote to memory of 800 3392 chrome.exe 80 PID 3392 wrote to memory of 800 3392 chrome.exe 80 PID 3392 wrote to memory of 800 3392 chrome.exe 80 PID 3392 wrote to memory of 800 3392 chrome.exe 80 PID 3392 wrote to memory of 800 3392 chrome.exe 80 PID 3392 wrote to memory of 800 3392 chrome.exe 80 PID 3392 wrote to memory of 800 3392 chrome.exe 80 PID 3392 wrote to memory of 800 3392 chrome.exe 80 PID 3392 wrote to memory of 800 3392 chrome.exe 80 PID 3392 wrote to memory of 800 3392 chrome.exe 80 PID 3392 wrote to memory of 800 3392 chrome.exe 80 PID 3392 wrote to memory of 800 3392 chrome.exe 80 PID 3392 wrote to memory of 800 3392 chrome.exe 80 PID 3392 wrote to memory of 800 3392 chrome.exe 80 PID 3392 wrote to memory of 800 3392 chrome.exe 80 PID 3392 wrote to memory of 800 3392 chrome.exe 80 PID 3392 wrote to memory of 800 3392 chrome.exe 80 PID 3392 wrote to memory of 800 3392 chrome.exe 80 PID 3392 wrote to memory of 800 3392 chrome.exe 80 PID 3392 wrote to memory of 800 3392 chrome.exe 80 PID 3392 wrote to memory of 800 3392 chrome.exe 80 PID 3392 wrote to memory of 800 3392 chrome.exe 80 PID 3392 wrote to memory of 800 3392 chrome.exe 80 PID 3392 wrote to memory of 800 3392 chrome.exe 80 PID 3392 wrote to memory of 800 3392 chrome.exe 80 PID 3392 wrote to memory of 800 3392 chrome.exe 80 PID 3392 wrote to memory of 800 3392 chrome.exe 80 PID 3392 wrote to memory of 800 3392 chrome.exe 80 PID 3392 wrote to memory of 800 3392 chrome.exe 80 PID 3392 wrote to memory of 800 3392 chrome.exe 80
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\VirusPack\FBIRAT_Fuck_Hack_Hound\Injection\Injection.html1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3392 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffda4c6cc40,0x7ffda4c6cc4c,0x7ffda4c6cc582⤵PID:3388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1672,i,4720163211352743888,14274444208806827144,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=1668 /prefetch:22⤵PID:3628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1756,i,4720163211352743888,14274444208806827144,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=1972 /prefetch:32⤵PID:2840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2192,i,4720163211352743888,14274444208806827144,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=2204 /prefetch:82⤵PID:800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3076,i,4720163211352743888,14274444208806827144,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=3120 /prefetch:12⤵PID:672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3088,i,4720163211352743888,14274444208806827144,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=3144 /prefetch:12⤵PID:3340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4500,i,4720163211352743888,14274444208806827144,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=4508 /prefetch:82⤵PID:4028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=736,i,4720163211352743888,14274444208806827144,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=4628 /prefetch:82⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:4612
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:384
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1576
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5b5ad5caaaee00cb8cf445427975ae66c
SHA1dcde6527290a326e048f9c3a85280d3fa71e1e22
SHA256b6409b9d55ce242ff022f7a2d86ae8eff873daabf3a0506031712b8baa6197b8
SHA51292f7fbbcbbea769b1af6dd7e75577be3eb8bb4a4a6f8a9288d6da4014e1ea309ee649a7b089be09ba27866e175ab6f6a912413256d7e13eaf60f6f30e492ce7f
-
Filesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
Filesize
1008B
MD5d222b77a61527f2c177b0869e7babc24
SHA13f23acb984307a4aeba41ebbb70439c97ad1f268
SHA25680dc3ffa698e4ff2e916f97983b5eae79470203e91cb684c5ccd4ff1a465d747
SHA512d17d836ea77aeaff4cd01f9c7523345167a4a6bc62528aac74acde12679f48079d75d159e9cea2e614da50e83c2dcd92c374c899ea6c4fe8e5513d9bf06c01ff
-
Filesize
649B
MD5ab59c8f9143da6a6ea446eed001a7d78
SHA177b5abd079c24dab981b3c2264644072e941d04e
SHA25687c671fdf80f23167b536ad67def665804a3dd5b20f0af8d155b8ad8ec8a4028
SHA5129d84263960b86465a9a0ab0a0312f3e42f0ef4c0f96923d6d03ce088ae242fbc9140a06d37deea8ec8a176502ee5f9265e57ae592c12d004f0d9324a04b19672
-
Filesize
1KB
MD51e9bef780db351cb7a25f9f9d89b59bf
SHA12aa5f0c73b37f9079a1960da50e5bee0def2ca1c
SHA2563ba6b7b5bf3b5251e2a34de1e124dc6dc07699f26b0d000f360a1a4e9510d88f
SHA512d53db6620801265fa1fc06704d9541cb7feb927bc98c067368fad1e2836417acfa8c610d78abe3644c4d89ff4b9afcdf002e9a8041ede77bcdb632e3ca3b370f
-
Filesize
1KB
MD52f9e9f99114d8b7574ee9fe037c98b35
SHA1627072c3d476df1c1387d71246d698dc227d2abc
SHA256b711f987375a7241e2c28df44e63240d7c18c7dd97286a90c922c0c4d908b393
SHA5127d1e0fc69a177c3cf7e0c7bd6ff189523056daadbc5488dd7fd7853066de2dc9b36cee41d015ae400b468a1e34daa4c9f6e3ddaa05a2d77eeb5b29f7dd94ed75
-
Filesize
1KB
MD52bb5c7a3454ea69a1e4de3025be874ec
SHA1c917f6054f5801f54921ae3075375d9e0f392735
SHA2563d4835af4d5d72d37931bf68a66e043d7090e12464568b0959bf84709b28a6d5
SHA512ec35158dc1b4c19bbef6caf9fc4a8250f24c29ec1b522fc88419e487ae567fca689984e8e35bbea9f254888c07f76008c17d8c891d1e850647d42a8d226fabb1
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
9KB
MD5ad1bf99376c66e87c5fb4bf4f1e15dc7
SHA10e36d57baf4a8b68282674fcf5a86591d2344190
SHA2569266ca4b0602a5785764dc0e1c97cc999b96ec04645f4a75731b21fa2350a69c
SHA512308ab9dc131c2ea3bc858374a7930c2c5816201931118ec87919d8db96a57b80a74d81f5fee25fb959edd969caf27d38ccf886f99b93ffa9159a09df6bfbf72e
-
Filesize
9KB
MD59fd647aae21bc8df7ce92ae319541597
SHA1145d41a273ea4a3dad8b4e3f0ebf3aed4a3748de
SHA256996e59a1592904a87904addfb63541f4f939a586ee99203d403b9f4cb68ef516
SHA512a1892474de5db160454a2cfa0d8d237b72151ca4c4256209904de6c1f543e63152ce2de226d1f36226023d5f768c4b02479e625861d0b737efd2e92e7ceddf00
-
Filesize
9KB
MD5c3e99e863f00da8b40eb65cb6346d620
SHA15d45b14e48d485c7590d50f5162c258bb3abc379
SHA256162760b0a55b4b14bc99a55d59d35549125aa5247e71b8d7657a0ab4bac2d7d8
SHA51200e86ed01b08b8b5a5838c68bc3fe089042cd34dd1e09884e4bab660c21bf1c45c7ddbe85aa656081ce90bba5490984f397af48ada83cb0536b3b91bae5eb04d
-
Filesize
9KB
MD5e39cfa59bb054873eee55a3d79ee80ff
SHA17be89df8d1ba87d8df69a7dfd6cb14ae9722746f
SHA256505988f6ff0ae699f0a246dae955441e039bc8cdaeebda4c2f7445789f54a5e5
SHA5120c3317a590b7c937385682bce10aaf720fc03f407f0bca2ca2b6af6d3cfc8ff44d777acceb70e91a044f1c89857e949b12caf4b0b9c5395010b7536caa478102
-
Filesize
9KB
MD57f302b6705d67f061aff77cda0ec803e
SHA1241aaa05fcddc485b8aa82790e4da1b2a9fec473
SHA2560ecc96095b7574dcf1940ced6a01121ed7be9a780fee7431504b927d0fd86280
SHA512a4cae82cf5d5177c2bb511296aea1a31de63931a0ad773fde54120948510550e931b3aa4caa1fc6db300e6bf73b61253af4c28aae99df2b2b49b3e2cd878ae91
-
Filesize
9KB
MD5e978a85c9011fc8e17b63cf08310ac90
SHA1359b9db1f6bdccf3616dc8e22f55407dcda33315
SHA2560bd011d347ddd562cc5985b7173163f15f1c6bd1fe7f9f049c8359b959e01382
SHA5120403c896c78e8e35dee3fefc447bb23ef1bb5dbe71d5e5b361827f3e6f386fd3c55783658df1bbbae92ebc898110d1bfb5b228652298f68643af64c513c2eeb6
-
Filesize
9KB
MD517b1dedda3cd18621d3608c4248a9c24
SHA1723eb0ba494613cc345858c8b071679bee33caad
SHA2561285ff74564db30ad995431f07b8232999cdf012eae0cd2ab8c95cb623ac5149
SHA512b8571584fb0fe5bca7de311908ef0f921a819d0b40fc2b5e6a4b48420bc3ab3f4728424e2a8905763059e45676b9b859c36d9e230796cba1d16a6636f8378c57
-
Filesize
9KB
MD5975e0342e1b296b404c59122ce4c1407
SHA1254fcdd00e1d01f0f229363ffd792b83780c86ad
SHA256168eba600f111e7a9b67d772c483a274fe8092417f32f97d4b04839e1e6ea7bc
SHA5129c2647920b922b414c03f37f86592bedf509ba5866b5fe7f9ac0d0108a1b0b67204401e4e5393311fd2d3fa3a647056850091078ab2ab9f46efabe1ca3341e75
-
Filesize
9KB
MD54784fc914bbebf47c87000006667471b
SHA199957157b4daee03672c1344f48bf856f94573ed
SHA25692bba97f778d201b836ec422129116f2107ef07e6221aceb5d5e41e55b2e7445
SHA512a625b5d77195c2721993f363a90a17463c6e846acdd837d14cde183d503027035990961dce721d181d73183615e6e7fef27822c97694c35a4934bfb5888ceb17
-
Filesize
9KB
MD5384d6db1944020827418fdb1883f70ca
SHA134645aab808a35f2c62f6b36469af555c0269e49
SHA2560e5f989d22d19c860b341b4d14c727a79a580708b502f3ed132abe9bd5cd0d1b
SHA512d12bfea3ad2d3906a495cadd41be9fd153d1ef685cf12d46bc0e65b1dcf492344492f01ff23f4e96b24ed0688f6488c8cc095d8489abffb7f71f6aaeace57d6c
-
Filesize
9KB
MD519dc231a62c14d19be168b3888204f23
SHA166b37e9da692cc1f15c33dfd34db056a79c21bc4
SHA256c5673a8910e54ffe780dd05481ff50f145289c52b913107d323d05d011fb64c5
SHA512894881509a1026587439d1cdb5d9c7f3d3f7868b87a2f0f4135acd651387f474b0b22866ea91e1a268ac1ceee8eef834f1a7a9d718168a27dd27fc2ace9ddeea
-
Filesize
9KB
MD56aa1d5ee36cf82f9c81e16174a6cc7b0
SHA116247480a59837c706ce234b1deac9df183a9f57
SHA256cf9eb12aff283fd34b583f3a25dc8de4b1d4952a26097a2aa690ab119ced24c3
SHA5120b36c8403a8fde0c9ed1c2347a3e49b89cc88e4d0eb231e64a0869dae7bf2c5412b64ec921e785e3a7d69a2fb4a810a1631453d10ec090cc1d8fca06070350aa
-
Filesize
9KB
MD5cc487ddf8cf2020106f34a72ba335b37
SHA173cb99c6e405957ca114175c1d4db88ee57d8aef
SHA256028b46c4eba6cdae2cb5e2088ccda845a93e199ab454da5c2e0323364c793641
SHA5128440aa5a790a9cb9580a1cec5a42d1f2b770272f51ae24310cc5aec697962237d85bde69cbdc6df16cf0bc8a78ea6cbbdadbd6e0eeb66a2a09ab9aa3719972b6
-
Filesize
9KB
MD57c07c50b9f7e4f911e0132e812f7ff6f
SHA1482ccd209f80a0fa73c0ed7fda3614636dcf6615
SHA256fadfdc6b3bda5d7d450bb803681a288950c818905694532c5f778219ea74c7b7
SHA51229c79a6ff155d8feaab38c17f50ddc0e0f827d2b6755d22a757c50fe205ab8c78ed8afccbec3a0bd33c8eb076da1c539cad5bf8c46ca6239db7ba60eacf513ed
-
Filesize
9KB
MD5ae2a53c822f5bf67435378b42a2a9075
SHA113ecb8449348c2409a4de70a93a95eb6a6429e65
SHA25674848deb56f42984cb14220c50a2e1298f3fdae73b8ffdc8993fa459d2d4b57b
SHA5125c18c2b95d2b6fd41e828668c61a21b4ad4892276c35765e5f8e0701a41bbf0ebb2586f87e2e0266028050274894133e967cca699aa156b1fd0854a04a2624fb
-
Filesize
9KB
MD5d7a48e8c6c46151698db1782863fcc0c
SHA1b09b78f5538fc249a2631db979668224aa00b3c8
SHA256c92ba4d24f5968453654129134b36c76b88633f3eb04d752776dcb2b291a829c
SHA5122502a858edca39e3aa14dd8719c9fcf131c1454ec56dae70f6237d7c561b141c36fe125c30a04d59b32bc9a33be4c0d17d641fcd8c44539f730514c218c1c0cb
-
Filesize
9KB
MD5655066ed60c2af980969767a0f7c5e13
SHA1089fcc1c255b1e65693c39df371fc70ae500168b
SHA2564f425532a6eb11ce20ffdb37ccc1ea2b8120500e990c9efe0707b39714794888
SHA512651fef2a043856402ed70558fe505939e96f3d2b5ff15e368247ece8ce66e933bbfdc110a47b9203dba48f17bc0a00a7139610a441160dbb52a7a55d1c6b6074
-
Filesize
9KB
MD50d2fdbf5771d453f7d8b0ec6a1afb63b
SHA127d71b4a41f1fa9cfa29c5edc7cc1f9a8fea8748
SHA256e906fc17467a6c67a06e0d3b5ff7ea40e34e4a7b63ce50da2a0269d11d0b8207
SHA5123e6cb9a4d485cba34ca567703534211eb20f9d96594ddc1ded9b8593b63afe7acd895ed8f23348fd278fb2766bc90ff7b0ce16fbd23310966bf2700ad41e54da
-
Filesize
9KB
MD5d0d6beba47627fae8e2c5e637d5eface
SHA10ae8c540a93380ecfd2c9655a9f4b7d84191a2ac
SHA25669666e979ea33e63151467c3e7f02cb087a322db3898a7ab92e17b77d62c53fe
SHA512de89eef3862defe0128261c4a44a4ee2ad03c9627702d69a77cdbdd4b0bbd1ccea31975ddf26a8359907ee17482d94a365e2fbd717b26ebd656bdff4913cc4dd
-
Filesize
9KB
MD5828c67fa3c814a8373884f78d9a79eae
SHA14282253951a81896d51aabc8cfbd9ae8528328bd
SHA2567eb1a3d44368bb397efe7a3e0c98eec60d6d2a9bd13baefe403c9459dae612b3
SHA5122e68c7c2f4d8ee08facaba3ee11916a75741c6fbaa8d48b0c9585d005ca8fb7cf4e828537692ffa4e4210f0079c37202c2accf357e01b4b70f819ca7f1f0ae42
-
Filesize
9KB
MD5aef48449e22b21d63847d3fda6b84058
SHA1d0fd538dd42b6b0b65427cf2748c9f791c3589f4
SHA2560359cc704a38141db9d3b46c56e699656d32a793d3e2542972bf4d9933c81ede
SHA512a6d04dfabab9728e366fcaaf45e26e311dea7725387c41f899fea8b719ea48e125242e8f78a3a3ad2bf716c5212c05e18eb37500845be07df6b5eff9193c2fd7
-
Filesize
9KB
MD59cf2e94ca97793b632b1b0a234ae331f
SHA1a10df9f336e3e42b9975f3373013898ed3eb8e09
SHA2568ca49669465a0265ae42d073c2e38664e733b01d027fe1eb34d5341b0f807d35
SHA512c4dcb6dd2afd6ec445e85ae9be0eb04a0d7de327dda91e93d181660ef6a00ad5e53b51eedb705691484620b467d36e6a2b34129ea3780b36101d713bee759027
-
Filesize
9KB
MD5756ef959af46acf83f80f80b013ae682
SHA10182720aeae7b4203e2eeebc5497465b925942d9
SHA256d0f436e77bd66a9700d4657ee48cbf5c79128d4e275b00295aa91cdc7d3738ba
SHA512d85846e218419087fe95e28de2993b67f1a31f029e0f61259aacc5533b14d6b1cbccc89b5cfa55bbbcfd0a5163763fa9af6aaa2f27338fee46e868f53d19e575
-
Filesize
9KB
MD5abf5a995544c3021e912ca910677ed24
SHA19698b37db4413c3539d559a2c29abdb8fbe2e05a
SHA256cac8a38322a3c88ff8ef64ddec4c812815c275ebee8ae344d9e8c0bdab764fc4
SHA5125306b627d9b6e7df92fd8d992e8aac99ba459a4520029a34dd6b8666eb016b0aa2d676c2a20092488699abbbab354eb77e6243d422a9797ddd48184518fa0bfc
-
Filesize
9KB
MD55d7ec47e81b7aafa1f95af1844cc4cd1
SHA13be2c68e67f58ac7298ab4285609b31ecad237b9
SHA256355283a260fcc21be6a0f1055d527bd593352028613c5c585e96a69e73c279e0
SHA512134b5c49d21505046d13f6dad46daccc1ada2bb1cdca73fdba0e1715c0664c165dbd261d449293ea87c28c050ea88608432ee96eeafab5db2be199b0a2918e40
-
Filesize
9KB
MD516afb8fe206cbca01c42151773c2f7ee
SHA1590c3810723e6ffe4adcca582d1348ec2e853efa
SHA25677110fe5f240bbb0cac8e1b0da8406c9c63d0121d383f59fc7877b51742646f5
SHA5127bbc75326520eaaec1759814115241da36327aad68755ae4de009338339c4cd1844156d70fb4147aefaee07c4eaec370683b0a20ea31c1fe4512172b6d86ad0a
-
Filesize
9KB
MD531cb90223619602b4565a07f383a7c73
SHA15e151f3e133b4eb84af62059a8d47513b5032fba
SHA25634857eb6f53b207b3ef0bea873ce822e61e4a67ec3dd7ada2944f190eb55568f
SHA512ea8ae378b2c7f2b601eb1c35b2010dc5ebf51186611b464fe55ce2d417a500721c27cdfd342fadb03bf632da22d67ded020f9974f8686ab5c53e58364290d720
-
Filesize
9KB
MD5e2adb34cb4ec40abc68c056e36def61d
SHA10a4c9f40d41fa0d1aee4fac08df077078d010bd5
SHA25624dadb5306d1ec24392b82b4035035c49b47c72ea9916b52ee598e7e83309697
SHA5121610ba7a1b1ee8d61bed026341b87c9dd7c18fd8241b08964d043ed1b28a3bbd67deb80834f7a2ba0f44a09d8e42829bb7f737b922f69ce4be67853d474a73bf
-
Filesize
9KB
MD5b206c3a5b5f299fd9a8c064d40405c41
SHA108ada5f53b80987b3123611ed05e12ebeb11bd54
SHA25666121d9ca08683904ac6d0e5b76cdf6fa84a0b1b06d4ce462dacc10dcb252e39
SHA512f322fd9a3323dad1e5ebd7213324fa27590d42fea1e592cea20cf9e34ad432f0bba2c3fb104f7c0598a9f4334cfea16b0930331f01b1be317ac41cd58a2c7e9b
-
Filesize
9KB
MD56f857e5b37139eb35809b27165f3f405
SHA167c67952d6e26d9ce7ca6f977944a07c084abeff
SHA2561bd3e27122cd19e8ab643621fe5faafca1fa409fe7b79d1c8b621845fea1bad1
SHA512aa94810535cad9f42a979d1e77315ab8bd7e17afd31be18bc072163d3a7b6d53b0fbb5f29b2d024e976c01a70bb65046ba0240b8c1fc20cd358fe4f7f6bd667c
-
Filesize
9KB
MD5f72cb64693b6b09ced124f3328508908
SHA1d021d856e37092acb841f4681ddc0beaedd05e8b
SHA25667147ff53162674b3021a2be0a73959690d12dfc92be8dd033ffd8551cc80423
SHA5128be001322ee981760fe53f59fd583132c9badabe441ccdcc310246b1f8ed3e026dbfdbe2ab2fde7256a67bf2a0166e4257361c4ee40128740a2cfeb4b43d069b
-
Filesize
118KB
MD5ecdb4caadf1d1c1a1ff35eb0246625eb
SHA169f3e81e700b87b3dae87cacc0e0bd81ea78217f
SHA256d41d89b9285dd6aa329a5d4aef052db6ab99c79757e2f7fc78f4c674a84234d0
SHA5121e318240d3dfbb0b0ad273d5d31d127e493766d9a0655a44d5ec7901c862814f3a8572aa1708a79d17e454757dccc8adf86868c9c5194c86826d1f80d90ab13a
-
Filesize
118KB
MD54b7fcb5c0ff03b62e9887dc6338f0003
SHA150f2c565278a9f80d08d5f1af08e64dbe3f263c4
SHA2561e92c071ad4454737cfcbf987caaaa8491e54b8bc9b266d593adb6af60980fb7
SHA512f9190bf40e894dea16cc47efd5429f29e098840e7fd82f3472df950fcf242c1ef531a2664664f6c25a28fa29edd27ff440b31c6d882aec7d9ee911923b5fb3be